- May 13, 2010Think Before you CloudA few years ago, when wireless networking was still relatively new, there were numerous reports of enterprising employees who, frustrated with the pace of new technology in...Read More
- May 3, 2010Fear and Loathing in Online AdvertisingHave you ever seen an interactive advertisement while browsing around on the Web and, even though it was from a brand that you recognized promoting a product, service or ev...Read More
- April 19, 2010The Road to Data Breach is Paved with Good IntentionsWe recently completed some new research with Accenture in which we were surprised to find that, in spite of all the attention being paid to data protection, and in spite of...Read More
- April 17, 2010Economic Impact of Privacy on Online Behavioral AdvertisingIndependent Ponemon Institute research looks into the controversial behavioral advertising industry to understand from marketers their experience with the medium’s su...Read More
- April 14, 20102010 Security in the TrenchesWe just completed a survey of federal IT security professionals to examine the data protection posture of government agencies. Through the survey, sponsored by CA, we ...Read More
- February 17, 2010How Global Organizations Approach the Challenge of Protecting Personal DataHow data privacy perceptions and practices around the globe inform and influence data protection practices. More than 5,500 business leaders were surveyed....Read More
- February 17, 2010Making Web 2.0 WorkPonemon Institute with sponsorship from IBM conducted a study of Web 2.0 users in the US, Brazil, Russian Federation, People's Republic of China, Singapore, Sweden and Germ...Read More
- January 18, 20102010 Access Governance Trends SurveyThis second annual study examines access governance practices in US organizations. The objective of this study is to track perspectives of IT security and compliance practi...Read More
- December 10, 2009Training Is the Strongest LinkToday we held a RIM College event featuring three noted experts in corporate privacy training programs -- namely, Dean Forbes (Merck), Bob Posch (Merck) and John Block (Med...Read More
- December 5, 2009Sophos & Ponemon Institute Announces New StudyWe are pleased to present The State of Privacy and Data Security Compliance study conducted by Ponemon Institute and sponsored by Sophos. The purpose of the study is to det...Read More
- November 21, 2009Crowe Horwath & Ponemon release HITECH studyI am delighted to share with you our recently completed benchmark study that focuses on healthcare organizations and their ability to comply with new regulations. Of 7...Read More
- November 19, 2009eGov Initiative Not Without Risk to Citizen DataThe eGovernment movement is a good thing, and maybe too long in coming given how many years businesses have been taking advantage of technology to provide convenience and a...Read More
- August 31, 2009The Goal is CredibilityI want to share an article with you that I think has a tremendous lesson for anyone in the business of building trust. The article is from a recent edition of Foreign...Read More
- July 21, 2009Archer-Ponemon Treaty for Data GovernanceI’m still processing a lot of the information gathered, shared, and created during our 8th RIM Renaissance this past weekend in Minneapolis. One of our sessions ...Read More
- July 20, 2009Thank You, Friends of the Ponemon Institute!A warm thank you to everyone who made this past weekend's RIM Renaissance a success. The discussions were lively and productive, and I think we all came away just a l...Read More
- July 14, 2009What We have here is, Failure to CommunicatePrivacy pro: Do you ever feel like you are working overtime to meet overly ambitious expectations? Are you frustrated by your attempts to outline a plan for protecting...Read More
- June 10, 2009More Employees Ignoring Data Security PoliciesDoes it surprise you to learn that, according to our recent study, Trends in Insider Compliance with Data Security Policies: Employees Evade and Ignore Security, employee c...Read More
- April 6, 2009Dr. Ponemon's BlogWelcome to my new blog. I look forward to sharing some of our thought provoking research. I also look forward to receiving your comments and questions. Stay tuned....Read More
- January 17, 2008Annual Privacy Trust Study for Retail BankingIt should come as no surprise that trust is increasingly important in customers’ loyalty to their bank. While overall trust in the industry is down, banks that experi...Read More
Blog
Categories
Tags
- Access Governance (1)
- Access Management (1)
- Accountable Care Organizations (1)
- ACH (1)
- Advanced Persistent Threats (2)
- Advanced Threats (1)
- Aftermath (1)
- Application Development (2)
- Application Security (3)
- Authentication Process (1)
- Best Practices (20)
- Big Data (2)
- Botnets (1)
- Breach Response (1)
- Business Continuity Management (1)
- Business Logic Abuse (1)
- Business Risk (1)
- CISO (1)
- Cloud (5)
- Cloud Security (2)
- Cloud Servers (4)
- Communication Inefficiency (1)
- Compliance (9)
- Confidential Data (1)
- Consumers (3)
- Containment (1)
- Cost Of Cyber Crime (5)
- Cost Of Data Breach (13)
- Cost Of Insider Threats (1)
- Credit Score (1)
- Criminal Attacks (1)
- Cryptography (2)
- Cyber Attack (1)
- Cyber Attacks (15)
- Cyber Crime (10)
- Cyber Defense (2)
- Cyber Extortion (1)
- Cyber Insurance (1)
- Cyber Readiness (1)
- Cyber Resilient (2)
- Cyber Security (17)
- Cyber Strategies (1)
- Cyber Threat (2)
- Cybersecurity Risk (1)
- Data Breach (30)
- Data Breach Preparedness (1)
- Data Center (2)
- Data Center Outages (4)
- Data Loss (1)
- Data Protection (24)
- Data Security (15)
- DDoS (1)
- Denial Of Service (1)
- Detection (1)
- Digital Certificate Management (1)
- DLP (2)
- Ecommerce Security (1)
- Electronic Medical Records (1)
- Electronic Payments (1)
- Employee Negligence (2)
- Encryption (4)
- Encryption Trends (1)
- Endpoint Defense (1)
- Endpoint Risk (4)
- Endpoint Security (6)
- Explanation Of Benefits (1)
- File Sharing (1)
- Fraud (3)
- Geo-location (1)
- Global Security (1)
- Government (1)
- Hacking (1)
- Hardware Security Module (1)
- Healthcare (4)
- Healthcare Data (1)
- Holistic (1)
- HSM (1)
- Human Factor (1)
- Identity Governance (1)
- Incident Response (2)
- Insecure Mobile Devices (1)
- Insider Fraud (1)
- Insider Risk (1)
- Insider Threats (2)
- Intellectual Property (1)
- Internet Of Things (1)
- IT Architecture (1)
- IT Security (10)
- IT Transformation (1)
- Laas (1)
- Live Intelligence (1)
- Malicious Attack (1)
- Malicious Breach (3)
- Malware (4)
- Malware Detection (2)
- Managed Security Services Providers (1)
- MDM (1)
- Medical Identity Theft (6)
- Medical Records (5)
- Mega Breaches (1)
- Megatrends (1)
- Merchant Payment Security Practices (1)
- Mixed Content Warnings (1)
- Mobile Application Security (1)
- Mobile Apps (2)
- Mobile Banking (1)
- Mobile Devices (10)
- Mobile Health Services (1)
- Mobile Security (7)
- Most Trusted Companies (4)
- MSSP (1)
- Nation State Attack (1)
- Negligent Insider (3)
- Non-malicious Breach (2)
- Online Advertising (2)
- Online Banking (1)
- Online Health Services (1)
- Patient Privacy (7)
- Payment Security (1)
- PCI DSS (1)
- Post Breach (1)
- Privacy (8)
- Privacy Compliance (1)
- Privileged Access Management (1)
- Privileged User (1)
- Productivity (1)
- Providers (3)
- Ransomware (1)
- Regulated Data (1)
- Retail Banking (2)
- RIM Renaissance (2)
- Risk Assessment (2)
- Risk Based Security (1)
- Risk To Knowledge Assets (1)
- SaaS (1)
- Safeguard High Value Assets (1)
- Security (7)
- Security Innovation (1)
- Security Intelligence (1)
- Security Posture (1)
- Security Professional (2)
- Security Risk (2)
- Security Strategy (2)
- Security Technologies (2)
- Security Threat (1)
- Senior Executives (2)
- SIEM (1)
- Single Sign-on (1)
- SMB (1)
- SMS-based Two-factor (1)
- SSO (1)
- State Of Endpoint (1)
- System Glitch (1)
- Technology (2)
- Threat Intelligence (6)
- Threat Landscape (1)
- Two-factor Authentication (1)
- Vulnerable Code (1)
- Website Security (1)
- Wire Transfer (1)
Archive
202020192018201720162015- January (7)
- February (1)
- April (4)
- May (4)
- June (1)
- August (1)
- September (2)
- October (4)
- November (1)
- December (1)
- January (4)
- February (4)
- March (4)
- April (3)
- May (2)
- June (3)
- July (2)
- September (2)
- October (3)
- December (1)
- January (2)
- February (6)
- March (1)
- May (2)
- June (2)
- July (1)
- August (2)
- September (2)
- October (1)
- December (1)